dblp.uni-trier.dewww.uni-trier.de

James A. Malcolm

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
25EEAusten Rainer, Peter C. R. Lane, James A. Malcolm, Sven-Bodo Scholz: Using n-grams to rapidly characterise the evolution of software code. ASE Workshops 2008: 43-52
24EEMohammed S. Zahrani, Martin J. Loomes, James A. Malcolm, Abu Zafer M. Dayem Ullah, Kathleen Steinhöfel, Andreas Alexander Albrecht: Genetic local search for multicast routing with pre-processing by logarithmic simulated annealing. Computers & OR 35(6): 2049-2070 (2008)
2007
23 Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe: Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers Springer 2007
22EESu Mon Bo, Hannan Xiao, Aderemi Adereti, James A. Malcolm, Bruce Christianson: A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack. IAS 2007: 50-55
21EEHannan Xiao, James A. Malcolm, Bruce Christianson, Ying Zhang: Hierarchical Trustworthy Authentication for Pervasive Computing. MobiQuitous 2007: 1-3
2006
20 Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe: Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers Springer 2006
19EEMohammed S. Zahrani, Martin J. Loomes, James A. Malcolm, Andreas Alexander Albrecht: Genetic local search for multicast routing. GECCO 2006: 615-616
18EEMohammed S. Zahrani, Martin J. Loomes, James A. Malcolm, Andreas Alexander Albrecht: Landscape analysis for multicast routing. Computer Communications 30(1): 101-116 (2006)
2005
17 Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe: Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers Springer 2005
16EEBruce Christianson, Partha Das Chowdhury, James A. Malcolm: Auditable Anonymous Delegation. ICISS 2005: 66-76
15EEPartha Das Chowdhury, Bruce Christianson, James A. Malcolm: Anonymous Context Based Role Activation Mechanism. Security Protocols Workshop 2005: 315-321
2004
14 Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe: Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers Springer 2004
13EEPartha Das Chowdhury, Bruce Christianson, James A. Malcolm: Anonymous Authentication. Security Protocols Workshop 2004: 299-305
2003
12EEJames A. Malcolm: Blind Publication: A Copyright Library without Publication or Trust. Security Protocols Workshop 2003: 336-340
11EEJames A. Malcolm: Blind Publication: A Copyright Library Without Publication or Trust (Discussion). Security Protocols Workshop 2003: 341-349
2002
10 Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe: Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers Springer 2002
9EECaroline Lyon, Bob Dickerson, James A. Malcolm: Incremental Retrieval of Documents Relevant to a Topic. TREC 2002
2001
8 Jill Hewitt, Sarah A. Jones, James A. Malcolm, Robert J. Ollenbuttel: Experiences With Web Content Creation From a Database. Digital Content Creation 2001: 316-331
7EEJames A. Malcolm: Lightweight Authentication in a Mobile Network (Transcript of Discussion). Security Protocols Workshop 2001: 217-220
2000
6 Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe: Security Protocols, 7th International Workshop, Cambridge, UK, April 19-21, 1999, Proceedings Springer 2000
5EEBruce Christianson, Bruno Crispo, James A. Malcolm: Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms. Security Protocols Workshop 2000: 182-183
1999
4 Bruce Christianson, James A. Malcolm, Brian L. Robinson: Pictures Can't Lie under Oath. Security Protocols Workshop 1999: 208-218
1998
3EEBruce Christianson, James A. Malcolm: Delegation and Not-So Smart Cards (Position Paper). Security Protocols Workshop 1998: 154-157
1997
2 Bruce Christianson, James A. Malcolm: Binding Bit Patterns to Real World Entities. Security Protocols Workshop 1997: 105-113
1 Marie Rose Low, James A. Malcolm: A Joint Authorisation Scheme. Operating Systems Review 31(1): 88-96 (1997)

Coauthor Index

1Aderemi Adereti [22]
2Andreas Alexander Albrecht [18] [19] [24]
3Su Mon Bo [22]
4Partha Das Chowdhury [13] [15] [16]
5Bruce Christianson [2] [3] [4] [5] [6] [10] [13] [14] [15] [16] [17] [20] [21] [22] [23]
6Bruno Crispo [5] [6] [10] [14] [17] [20] [23]
7Bob Dickerson [9]
8Jill Hewitt [8]
9Sarah A. Jones [8]
10Peter C. R. Lane [25]
11Martin Loomes (Martin J. Loomes) [18] [19] [24]
12Marie Rose Low [1]
13Caroline Lyon [9]
14Robert J. Ollenbuttel [8]
15Austen Rainer [25]
16Brian L. Robinson [4]
17Michael Roe [6] [10] [14] [17] [20] [23]
18Sven-Bodo Scholz [25]
19Kathleen Steinhöfel [24]
20Abu Zafer M. Dayem Ullah [24]
21Hannan Xiao [21] [22]
22Mohammed S. Zahrani [18] [19] [24]
23Ying Zhang [21]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)